Which of the following is a network address used to identify devices in layer three of the OSI model?

Which of the following is a network address used to identify devices in layer three of the OSI model?A . TCP port numberB . DNS addressC . MAC addressD . IP addressView AnswerAnswer: D

April 13, 2025 No Comments READ MORE +

What is a common function of adware?

What is a common function of adware?A . Encrypting data on a systemB . Stealing sensitive informationC . Displaying unwanted advertisementsD . Providing remote access to a systemView AnswerAnswer: C

April 11, 2025 No Comments READ MORE +

Which of the following backup types only copies data that has changed since the last backup, regardless of which type of backup it was last performed?

Which of the following backup types only copies data that has changed since the last backup, regardless of which type of backup it was last performed?A . Full backupB . Incremental backupC . Differential backupD . Synthetic backupView AnswerAnswer: B

April 11, 2025 No Comments READ MORE +

Which term describes the ability to prove that a specific individual or entity performed an action, such as sending a message or conducting a transaction?

Which term describes the ability to prove that a specific individual or entity performed an action, such as sending a message or conducting a transaction?A . Non-repudiationB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: A

April 9, 2025 No Comments READ MORE +

Which of the following is used to verify the identity of a website?

Which of the following is used to verify the identity of a website?A . X.509 digital certificateB . SSL/TLSC . Certificate Signing Request (CSR)D . Diffie-Hellman key exchangeView AnswerAnswer: A

March 31, 2025 No Comments READ MORE +

Which of the following is the role of OpenPGP key servers?

Which of the following is the role of OpenPGP key servers?A . OpenPGP key servers manage email communications.B . OpenPGP key servers are only used with Mozilla Thunderbird.C . OpenPGP key servers provide antivirus protection for email communications.D . They allow users to store and retrieve public keys associated with...

March 31, 2025 No Comments READ MORE +

Which of the following encryption methods is used for email encryption and requires the use of a public key and a private key pair?

Which of the following encryption methods is used for email encryption and requires the use of a public key and a private key pair?A . Certificate AuthorityB . S/MIMEC . OpenPGPD . SMTP STARTTLSView AnswerAnswer: C

March 31, 2025 No Comments READ MORE +

What is the purpose of The Onion Router (TOR) network?

What is the purpose of The Onion Router (TOR) network?A . Anonymity and PrivacyB . Network MonitoringC . Data StorageD . Speed OptimizationView AnswerAnswer: A

March 29, 2025 No Comments READ MORE +

What is OpenPGP?

What is OpenPGP?A . An email client for encryption and signing messages.B . An open-source implementation of the S/MIME standard.C . An open standard for email encryption and signing using public key cryptography.D . A certificate authority (CA) for S/MIME encryption.View AnswerAnswer: C

March 27, 2025 No Comments READ MORE +

Which of the following is a security implication of shared access to data in the cloud?

Which of the following is a security implication of shared access to data in the cloud?A . Increased risk of unauthorized access to dataB . Improved data securityC . Improved data accessibilityD . Decreased risk of data lossView AnswerAnswer: A

March 26, 2025 No Comments READ MORE +